“My message for companies that think they haven’t been attacked is: You are not looking hard enough.”
Day 70: If your system looks like this, you need to clean it up asap. Hackers scan PCs and websites with a type of malware and this leads to data leakage, identity theft and more sorts of breaches. Clean your systems, delete files and software you have not been using. #100securedays
Day 71: You can accidentally click on anything. From phishing scams to malicious pop-up ads, run a scan just to be certain you are secure. #100securedays
Day 72: Attackers exploit weaknesses in the Transmission Control Protocol (TCP) connection three-way handshake, which is the communication process between the client, the host, and the server. Attackers send SYN packets to the aimed server as a spoofed message until the table memory connection of the server is exhausted causing the entire service to shut down. #100securedays
Day 73: You might be working in a start up or a SMB or just starting off by yourself, this is a very healthy routine to follow. Scan your systems, remove things you don’t need or want in your devices, follow recommendations you find from trusted sources. You can also follow us on our social channels for more security tips. #100securedays
Day 74: The User Datagram Protocol (UDP) DoS attack will flood various ports at random, leading the host server to report back with an Internet Control Message Protocol (ICMP) packet. Without an early threat detection and traffic profiling system, it’s impossible to know if they’re there. Which means you will only know about it if your website crashes. #100securedays
If you would like to speak to our security consultants on best practices to keep your business secure, please contact us to discuss your unique requirements.